1980
DOI: 10.1109/tcom.1980.1094698
|View full text |Cite
|
Sign up to set email alerts
|

Multiaccess Protocols in Packet Communication Systems

Abstract: Abstmcr-The need for multiaccess protocols arises whenever a resource is shared by many independent contending users. Two major factors contribute to such a situation: the need to share expensive resources in order to achieve their eflcient utilization, or the need to provide a high degree of connectivity for communication among independent subscribers (or both). In data transmission systems, the communication bandwidth is often the prime resource, and it is with respect to this resource that we view multiacce… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
55
0

Year Published

1981
1981
2014
2014

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 314 publications
(56 citation statements)
references
References 45 publications
1
55
0
Order By: Relevance
“…For a bursty workload, simple round-robin time-division multiple access (TDMA) [25] is highly suboptimal, resulting in many wasted data slots. Furthermore, there have been many independent proposals for conserving power in CSMA sensor networks [10], [26], and in multihop ad hoc networks in general [4], [9].…”
Section: B Tdma-based Protocolsmentioning
confidence: 99%
“…For a bursty workload, simple round-robin time-division multiple access (TDMA) [25] is highly suboptimal, resulting in many wasted data slots. Furthermore, there have been many independent proposals for conserving power in CSMA sensor networks [10], [26], and in multihop ad hoc networks in general [4], [9].…”
Section: B Tdma-based Protocolsmentioning
confidence: 99%
“…Distributed coordination function (DCF) is based on using carrier-sensing multiple access with collision avoidance (CSMA/CA). There are numerous CSMA protocols and their performances under low load conditions are usually similar [4,5]. The many variations arise because of efforts to improve on performance and push back the limits.…”
Section: Mac Layer Protocolsmentioning
confidence: 99%
“…It is the switching among source-destination pairs that requires us to consider CDMA in combination with another multiple access algorithm. We investigate spread spectrum in combination with random access schemes, since they are combined more naturally [16], [17], and the splitting (or tree) algorithms [18]- [24] are natural for consideration in combination with spread spectrum since packets that collide in time can be retrieved to some extent.…”
Section: Introductionmentioning
confidence: 99%